Skip to main content

Showing 1–45 of 45 results for author: Fanti, G

  1. arXiv:2406.15842  [pdf, other

    cs.HC cs.CR cs.CY

    Privacy Requirements and Realities of Digital Public Goods

    Authors: Geetika Gopi, Aadyaa Maddi, Omkhar Arasaratnam, Giulia Fanti

    Abstract: In the international development community, the term "digital public goods" is used to describe open-source digital products (e.g., software, datasets) that aim to address the United Nations (UN) Sustainable Development Goals. DPGs are increasingly being used to deliver government services around the world (e.g., ID management, healthcare registration). Because DPGs may handle sensitive data, the… ▽ More

    Submitted 22 June, 2024; originally announced June 2024.

  2. arXiv:2406.02958  [pdf, other

    cs.LG cs.AI cs.CL cs.CR cs.DC

    PrE-Text: Training Language Models on Private Federated Data in the Age of LLMs

    Authors: Charlie Hou, Akshat Shrivastava, Hongyuan Zhan, Rylan Conway, Trang Le, Adithya Sagar, Giulia Fanti, Daniel Lazar

    Abstract: On-device training is currently the most common approach for training machine learning (ML) models on private, distributed user data. Despite this, on-device training has several drawbacks: (1) most user devices are too small to train large models on-device, (2) on-device training is communication- and computation-intensive, and (3) on-device training can be difficult to debug and deploy. To addre… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: ICML 2024 (Oral)

  3. arXiv:2405.20320  [pdf, other

    cs.CV cs.AI cs.LG

    Improving the Training of Rectified Flows

    Authors: Sangyun Lee, Zinan Lin, Giulia Fanti

    Abstract: Diffusion models have shown great promise for image and video generation, but sampling from state-of-the-art models requires expensive numerical integration of a generative ODE. One approach for tackling this problem is rectified flows, which iteratively learn smooth ODE paths that are less susceptible to truncation error. However, rectified flows still require a relatively large number of functio… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  4. arXiv:2403.10116  [pdf, other

    cs.CR cs.DS

    Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy

    Authors: Wei Dong, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi

    Abstract: Differentially private mechanisms achieving worst-case optimal error bounds (e.g., the classical Laplace mechanism) are well-studied in the literature. However, when typical data are far from the worst case, \emph{instance-specific} error bounds -- which depend on the largest value in the dataset -- are more meaningful. For example, consider the sum estimation problem, where each user has an integ… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  5. arXiv:2402.18905  [pdf, other

    cs.LG cs.AI cs.CR math.OC

    On the Convergence of Differentially-Private Fine-tuning: To Linearly Probe or to Fully Fine-tune?

    Authors: Shuqi Ke, Charlie Hou, Giulia Fanti, Sewoong Oh

    Abstract: Differentially private (DP) machine learning pipelines typically involve a two-phase process: non-private pre-training on a public dataset, followed by fine-tuning on private data using DP optimization techniques. In the DP setting, it has been observed that full fine-tuning may not always yield the best test accuracy, even for in-distribution data. This paper (1) analyzes the training dynamics of… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

  6. arXiv:2401.18024  [pdf, other

    cs.CR

    Benchmarking Private Population Data Release Mechanisms: Synthetic Data vs. TopDown

    Authors: Aadyaa Maddi, Swadhin Routray, Alexander Goldberg, Giulia Fanti

    Abstract: Differential privacy (DP) is increasingly used to protect the release of hierarchical, tabular population data, such as census data. A common approach for implementing DP in this setting is to release noisy responses to a predefined set of queries. For example, this is the approach of the TopDown algorithm used by the US Census Bureau. Such methods have an important shortcoming: they cannot answer… ▽ More

    Submitted 1 April, 2024; v1 submitted 31 January, 2024; originally announced January 2024.

    Comments: The 5th AAAI Workshop on Privacy-Preserving Artificial Intelligence

  7. arXiv:2312.06786  [pdf, other

    cs.LG cs.AI

    Mixture-of-Linear-Experts for Long-term Time Series Forecasting

    Authors: Ronghao Ni, Zinan Lin, Shuaiqi Wang, Giulia Fanti

    Abstract: Long-term time series forecasting (LTSF) aims to predict future values of a time series given the past values. The current state-of-the-art (SOTA) on this problem is attained in some cases by linear-centric models, which primarily feature a linear mapping layer. However, due to their inherent simplicity, they are not able to adapt their prediction rules to periodic changes in time series patterns.… ▽ More

    Submitted 1 May, 2024; v1 submitted 11 December, 2023; originally announced December 2023.

    Journal ref: Proceedings of The 27th International Conference on Artificial Intelligence and Statistics, PMLR 238:4672-4680, 2024

  8. arXiv:2311.00830  [pdf, other

    cs.HC

    User Experiences with Third-Party SIM Cards and ID Registration in Kenya and Tanzania

    Authors: Edith Luhanga, Karen Sowon, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye

    Abstract: Mobile money services in Sub-Saharan Africa (SSA) have increased access to financial services. To ensure proper identification of users, countries have put in place Know-Your-Customer (KYC) measures such as SIM registration using an official identification. However, half of the 850 million people without IDs globally live in SSA, and the use of SIM cards registered in another person's name (third-… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  9. arXiv:2309.00226  [pdf, other

    cs.HC

    The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania

    Authors: Karen Sowon, Edith Luhanga, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye

    Abstract: Digital financial services have catalyzed financial inclusion in Africa. Commonly implemented as a mobile wallet service referred to as mobile money (MoMo), the technology provides enormous benefits to its users, some of whom have long been unbanked. While the benefits of mobile money services have largely been documented, the challenges that arise -- especially in the interactions between human s… ▽ More

    Submitted 31 August, 2023; originally announced September 2023.

    Comments: To be published in IEEE Symposium on Security and Privacy 2024

    ACM Class: H.1.2

  10. arXiv:2308.00177  [pdf, other

    cs.LG cs.AI

    Pretrained deep models outperform GBDTs in Learning-To-Rank under label scarcity

    Authors: Charlie Hou, Kiran Koshy Thekumparampil, Michael Shavlovsky, Giulia Fanti, Yesh Dattatreya, Sujay Sanghavi

    Abstract: On tabular data, a significant body of literature has shown that current deep learning (DL) models perform at best similarly to Gradient Boosted Decision Trees (GBDTs), while significantly underperforming them on outlier data. However, these works often study idealized problem settings which may fail to capture complexities of real-world scenarios. We identify a natural tabular data setting where… ▽ More

    Submitted 25 June, 2024; v1 submitted 31 July, 2023; originally announced August 2023.

    Comments: ICML-MFPL 2023 Workshop Oral, SPIGM@ICML2024

  11. arXiv:2305.09123  [pdf, other

    cs.DC cs.CR

    CFT-Forensics: High-Performance Byzantine Accountability for Crash Fault Tolerant Protocols

    Authors: Weizhao Tang, Peiyao Sheng, Ronghao Ni, Pronoy Roy, Xuechao Wang, Giulia Fanti, Pramod Viswanath

    Abstract: Crash fault tolerant (CFT) consensus algorithms are commonly used in scenarios where system components are trusted -- e.g., enterprise settings and government infrastructure. However, CFT consensus can be broken by even a single corrupt node. A desirable property in the face of such potential Byzantine faults is \emph{accountability}: if a corrupt node breaks protocol and affects consensus safety,… ▽ More

    Submitted 3 June, 2024; v1 submitted 15 May, 2023; originally announced May 2023.

  12. arXiv:2303.02014  [pdf, other

    cs.CR cs.LG

    Summary Statistic Privacy in Data Sharing

    Authors: Zinan Lin, Shuaiqi Wang, Vyas Sekar, Giulia Fanti

    Abstract: We study a setting where a data holder wishes to share data with a receiver, without revealing certain summary statistics of the data distribution (e.g., mean, standard deviation). It achieves this by passing the data through a randomization mechanism. We propose summary statistic privacy, a metric for quantifying the privacy risk of such a mechanism based on the worst-case probability of an adver… ▽ More

    Submitted 27 October, 2023; v1 submitted 3 March, 2023; originally announced March 2023.

  13. arXiv:2302.09042  [pdf, other

    cs.LG cs.AI cs.DC

    Privately Customizing Prefinetuning to Better Match User Data in Federated Learning

    Authors: Charlie Hou, Hongyuan Zhan, Akshat Shrivastava, Sid Wang, Aleksandr Livshits, Giulia Fanti, Daniel Lazar

    Abstract: In Federated Learning (FL), accessing private client data incurs communication and privacy costs. As a result, FL deployments commonly prefinetune pretrained foundation models on a (large, possibly public) dataset that is held by the central server; they then FL-finetune the model on a private, federated dataset held by clients. Evaluating prefinetuning dataset quality reliably and privately is th… ▽ More

    Submitted 22 February, 2023; v1 submitted 17 February, 2023; originally announced February 2023.

  14. arXiv:2211.12686  [pdf, other

    cs.CR cs.SI

    Batching of Tasks by Users of Pseudonymous Forums: Anonymity Compromise and Protection

    Authors: Alexander Goldberg, Giulia Fanti, Nihar B. Shah

    Abstract: There are a number of forums where people participate under pseudonyms. One example is peer review, where the identity of reviewers for any paper is confidential. When participating in these forums, people frequently engage in "batching": executing multiple related tasks (e.g., commenting on multiple papers) at nearly the same time. Our empirical analysis shows that batching is common in two appli… ▽ More

    Submitted 11 September, 2023; v1 submitted 22 November, 2022; originally announced November 2022.

  15. arXiv:2206.01349  [pdf, other

    cs.LG cs.AI cs.CR

    On the Privacy Properties of GAN-generated Samples

    Authors: Zinan Lin, Vyas Sekar, Giulia Fanti

    Abstract: The privacy implications of generative adversarial networks (GANs) are a topic of great interest, leading to several recent algorithms for training GANs with privacy guarantees. By drawing connections to the generalization properties of GANs, we prove that under some assumptions, GAN-generated samples inherently satisfy some (weak) privacy guarantees. First, we show that if a GAN is trained on m s… ▽ More

    Submitted 2 June, 2022; originally announced June 2022.

    Comments: AISTATS 2021

  16. arXiv:2205.11736  [pdf, other

    cs.LG cs.AI cs.CR

    Towards a Defense Against Federated Backdoor Attacks Under Continuous Training

    Authors: Shuaiqi Wang, Jonathan Hayase, Giulia Fanti, Sewoong Oh

    Abstract: Backdoor attacks are dangerous and difficult to prevent in federated learning (FL), where training data is sourced from untrusted clients over long periods of time. These difficulties arise because: (a) defenders in FL do not have access to raw training data, and (b) a new phenomenon we identify called backdoor leakage causes models trained continuously to eventually suffer from backdoors due to c… ▽ More

    Submitted 30 January, 2023; v1 submitted 23 May, 2022; originally announced May 2022.

  17. arXiv:2205.06837  [pdf, other

    cs.CR cs.GT cs.NI

    Strategic Latency Reduction in Blockchain Peer-to-Peer Networks

    Authors: Weizhao Tang, Lucianna Kiffer, Giulia Fanti, Ari Juels

    Abstract: Most permissionless blockchain networks run on peer-to-peer (P2P) networks, which offer flexibility and decentralization at the expense of performance (e.g., network latency). Historically, this tradeoff has not been a bottleneck for most blockchains. However, an emerging host of blockchain-based applications (e.g., decentralized finance) are increasingly sensitive to latency; users who can reduce… ▽ More

    Submitted 11 September, 2023; v1 submitted 13 May, 2022; originally announced May 2022.

    Journal ref: Proc. ACM Meas. Anal. Comput. Syst. 7, 2, Article 32 (June 2023), 33 pages

  18. arXiv:2203.10674  [pdf, other

    cs.LG cs.CR cs.NI eess.SY

    RareGAN: Generating Samples for Rare Classes

    Authors: Zinan Lin, Hao Liang, Giulia Fanti, Vyas Sekar

    Abstract: We study the problem of learning generative adversarial networks (GANs) for a rare class of an unlabeled dataset subject to a labeling budget. This problem is motivated from practical applications in domains including security (e.g., synthesizing packets for DNS amplification attacks), systems and networking (e.g., synthesizing workloads that trigger high resource usage), and machine learning (e.g… ▽ More

    Submitted 20 March, 2022; originally announced March 2022.

    Comments: Published in AAAI 2022

  19. arXiv:2112.14737  [pdf, other

    cs.CR

    Distance-Aware Private Set Intersection

    Authors: Anrin Chakraborti, Giulia Fanti, Michael K. Reiter

    Abstract: Private set intersection (PSI) allows two mutually untrusting parties to compute an intersection of their sets, without revealing information about items that are not in the intersection. This work introduces a PSI variant called distance-aware PSI (DA-PSI) for sets whose elements lie in a metric space. DA-PSI returns pairs of items that are within a specified distance threshold of each other. Thi… ▽ More

    Submitted 18 July, 2022; v1 submitted 29 December, 2021; originally announced December 2021.

  20. arXiv:2112.03449  [pdf, other

    cs.CR

    Locally Differentially Private Sparse Vector Aggregation

    Authors: Mingxun Zhou, Tianhao Wang, T-H. Hubert Chan, Giulia Fanti, Elaine Shi

    Abstract: Vector mean estimation is a central primitive in federated analytics. In vector mean estimation, each user $i \in [n]$ holds a real-valued vector $v_i\in [-1, 1]^d$, and a server wants to estimate the mean of all $n$ vectors. Not only so, we would like to protect each individual user's privacy. In this paper, we consider the $k$-sparse version of the vector mean estimation problem, that is, suppos… ▽ More

    Submitted 26 February, 2022; v1 submitted 6 December, 2021; originally announced December 2021.

  21. arXiv:2108.06869  [pdf, other

    cs.LG cs.DC math.OC

    FedChain: Chained Algorithms for Near-Optimal Communication Cost in Federated Learning

    Authors: Charlie Hou, Kiran K. Thekumparampil, Giulia Fanti, Sewoong Oh

    Abstract: Federated learning (FL) aims to minimize the communication complexity of training a model over heterogeneous data distributed across many clients. A common approach is local methods, where clients take multiple optimization steps over local data before communicating with the server (e.g., FedAvg). Local methods can exploit similarity between clients' data. However, in existing analyses, this comes… ▽ More

    Submitted 16 April, 2023; v1 submitted 15 August, 2021; originally announced August 2021.

    Comments: abstract typo correction

  22. arXiv:2105.11119  [pdf, other

    cs.CL cs.AI

    Abusive Language Detection in Heterogeneous Contexts: Dataset Collection and the Role of Supervised Attention

    Authors: Hongyu Gong, Alberto Valido, Katherine M. Ingram, Giulia Fanti, Suma Bhat, Dorothy L. Espelage

    Abstract: Abusive language is a massive problem in online social platforms. Existing abusive language detection techniques are particularly ill-suited to comments containing heterogeneous abusive language patterns, i.e., both abusive and non-abusive parts. This is due in part to the lack of datasets that explicitly annotate heterogeneity in abusive language. We tackle this challenge by providing an annotate… ▽ More

    Submitted 24 May, 2021; originally announced May 2021.

    Comments: AAAI 2021 (AI for Social Impact track)

  23. arXiv:2103.16808  [pdf, other

    cs.CL

    Self-Supervised Euphemism Detection and Identification for Content Moderation

    Authors: Wanzheng Zhu, Hongyu Gong, Rohan Bansal, Zachary Weinberg, Nicolas Christin, Giulia Fanti, Suma Bhat

    Abstract: Fringe groups and organizations have a long history of using euphemisms--ordinary-sounding words with a secret meaning--to conceal what they are discussing. Nowadays, one common use of euphemisms is to evade content moderation policies enforced by social media platforms. Existing tools for enforcing policy automatically rely on keyword searches for words on a "ban list", but these are notoriously… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

    Comments: 18 pages, 5 figures, 10 tables, 42nd IEEE Symposium on Security & Privacy (2021)

  24. The Effect of Network Topology on Credit Network Throughput

    Authors: Vibhaalakshmi Sivaraman, Weizhao Tang, Shaileshh Bojja Venkatakrishnan, Giulia Fanti, Mohammad Alizadeh

    Abstract: Credit networks rely on decentralized, pairwise trust relationships (channels) to exchange money or goods. Credit networks arise naturally in many financial systems, including the recent construct of payment channel networks in blockchain systems. An important performance metric for these networks is their transaction throughput. However, predicting the throughput of a credit network is nontrivial… ▽ More

    Submitted 28 September, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

    Journal ref: Performance Evaluation, 2021, 102235, ISSN 0166-5316

  25. arXiv:2102.06333  [pdf, other

    cs.LG cs.DC math.OC

    Efficient Algorithms for Federated Saddle Point Optimization

    Authors: Charlie Hou, Kiran K. Thekumparampil, Giulia Fanti, Sewoong Oh

    Abstract: We consider strongly convex-concave minimax problems in the federated setting, where the communication constraint is the main bottleneck. When clients are arbitrarily heterogeneous, a simple Minibatch Mirror-prox achieves the best performance. As the clients become more homogeneous, using multiple local gradient updates at the clients significantly improves upon Minibatch Mirror-prox by communicat… ▽ More

    Submitted 11 February, 2021; originally announced February 2021.

  26. arXiv:2009.02773  [pdf, other

    cs.LG cs.CV stat.ML

    Why Spectral Normalization Stabilizes GANs: Analysis and Improvements

    Authors: Zinan Lin, Vyas Sekar, Giulia Fanti

    Abstract: Spectral normalization (SN) is a widely-used technique for improving the stability and sample quality of Generative Adversarial Networks (GANs). However, there is currently limited understanding of why SN is effective. In this work, we show that SN controls two important failure modes of GAN training: exploding and vanishing gradients. Our proofs illustrate a (perhaps unintentional) connection wit… ▽ More

    Submitted 7 April, 2021; v1 submitted 6 September, 2020; originally announced September 2020.

    Comments: 54 pages, 74 figures

  27. arXiv:1912.01798  [pdf, other

    cs.CR

    SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning

    Authors: Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramer, Giulia Fanti, Ari Juels

    Abstract: Incentive mechanisms are central to the functionality of permissionless blockchains: they incentivize participants to run and secure the underlying consensus protocol. Designing incentive-compatible incentive mechanisms is notoriously challenging, however. As a result, most public blockchains today use incentive mechanisms whose security properties are poorly understood and largely untested. In th… ▽ More

    Submitted 4 August, 2020; v1 submitted 3 December, 2019; originally announced December 2019.

  28. arXiv:1909.13403  [pdf, other

    cs.LG cs.DC cs.NI stat.ML

    Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions

    Authors: Zinan Lin, Alankar Jain, Chen Wang, Giulia Fanti, Vyas Sekar

    Abstract: Limited data access is a longstanding barrier to data-driven research and development in the networked systems community. In this work, we explore if and how generative adversarial networks (GANs) can be used to incentivize data sharing by enabling a generic framework for sharing synthetic datasets with minimal expert knowledge. As a specific target, our focus in this paper is on time series datas… ▽ More

    Submitted 16 January, 2021; v1 submitted 29 September, 2019; originally announced September 2019.

    Comments: Published in IMC 2020. 20 pages, 26 figures

  29. arXiv:1909.11261  [pdf, other

    cs.DC cs.CR cs.NI

    Practical Low Latency Proof of Work Consensus

    Authors: Lei Yang, Xuechao Wang, Vivek Bagaria, Gerui Wang, Mohammad Alizadeh, David Tse, Giulia Fanti, Pramod Viswanath

    Abstract: Bitcoin is the first fully-decentralized permissionless blockchain protocol to achieve a high level of security, but at the expense of poor throughput and latency. Scaling the performance of Bitcoin has a been a major recent direction of research. One successful direction of work has involved replacing proof of work (PoW) by proof of stake (PoS). Proposals to scale the performance in the PoW setti… ▽ More

    Submitted 17 February, 2023; v1 submitted 24 September, 2019; originally announced September 2019.

  30. arXiv:1909.08719  [pdf, other

    cs.CR cs.DC cs.IT

    Barracuda: The Power of $\ell$-polling in Proof-of-Stake Blockchains

    Authors: Giulia Fanti, Jiantao Jiao, Ashok Makkuva, Sewoong Oh, Ranvir Rana, Pramod Viswanath

    Abstract: A blockchain is a database of sequential events that is maintained by a distributed group of nodes. A key consensus problem in blockchains is that of determining the next block (data element) in the sequence. Many blockchains address this by electing a new node to propose each new block. The new block is (typically) appended to the tip of the proposer's local blockchain, and subsequently broadcast… ▽ More

    Submitted 18 September, 2019; originally announced September 2019.

    Comments: ACM Mobihoc 2019, Best paper award

  31. Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks

    Authors: Weizhao Tang, Weina Wang, Giulia Fanti, Sewoong Oh

    Abstract: Payment channel networks (PCNs) are viewed as one of the most promising scalability solutions for cryptocurrencies today. Roughly, PCNs are networks where each node represents a user and each directed, weighted edge represents funds escrowed on a blockchain; these funds can be transacted only between the endpoints of the edge. Users efficiently transmit funds from node A to B by relaying them over… ▽ More

    Submitted 20 October, 2020; v1 submitted 6 September, 2019; originally announced September 2019.

    Comments: This revision corrects an error in Thm. 3.2, which previously under-estimated the converse bound by a factor of 2/n

    Journal ref: Proc. ACM Meas. Anal. Comput. Syst. 4, 2, Article 29 (June 2020), 39 pages

  32. arXiv:1906.06034  [pdf, other

    cs.LG stat.ML

    InfoGAN-CR and ModelCentrality: Self-supervised Model Training and Selection for Disentangling GANs

    Authors: Zinan Lin, Kiran Koshy Thekumparampil, Giulia Fanti, Sewoong Oh

    Abstract: Disentangled generative models map a latent code vector to a target space, while enforcing that a subset of the learned latent codes are interpretable and associated with distinct properties of the target distribution. Recent advances have been dominated by Variational AutoEncoder (VAE)-based methods, while training disentangled generative adversarial networks (GANs) remains challenging. In this w… ▽ More

    Submitted 7 August, 2020; v1 submitted 14 June, 2019; originally announced June 2019.

    Comments: Published in ICML 2020. 45 pages, 52 figures, a new unsupervised model selection scheme (ModelCentrality) is introduced in this version

  33. arXiv:1901.01665  [pdf, other

    cs.DC cs.DS math.PR

    Communication cost of consensus for nodes with limited memory

    Authors: Giulia Fanti, Nina Holden, Yuval Peres, Gireeja Ranade

    Abstract: Motivated by applications in blockchains and sensor networks, we consider a model of $n$ nodes trying to reach consensus on their majority bit. Each node $i$ is assigned a bit at time zero, and is a finite automaton with $m$ bits of memory (i.e., $2^m$ states) and a Poisson clock. When the clock of $i$ rings, $i$ can choose to communicate, and is then matched to a uniformly chosen node $j$. The no… ▽ More

    Submitted 6 January, 2019; originally announced January 2019.

    Comments: 62 pages, 5 figures

  34. arXiv:1810.08092  [pdf, other

    cs.CR cs.DC cs.IT

    Deconstructing the Blockchain to Approach Physical Limits

    Authors: Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath

    Abstract: Transaction throughput, confirmation latency and confirmation reliability are fundamental performance measures of any blockchain system in addition to its security. In a decentralized setting, these measures are limited by two underlying physical network attributes: communication capacity and speed-of-light propagation delay. Existing systems operate far away from these physical limits. In this wo… ▽ More

    Submitted 1 October, 2019; v1 submitted 18 October, 2018; originally announced October 2018.

    Comments: Computer and Communications Security, 2019

    Journal ref: Computer and Communications Security, 2019

  35. arXiv:1809.07468  [pdf, other

    cs.CR

    Compounding of Wealth in Proof-of-Stake Cryptocurrencies

    Authors: Giulia Fanti, Leonid Kogan, Sewoong Oh, Kathleen Ruan, Pramod Viswanath, Gerui Wang

    Abstract: Proof-of-stake (PoS) is a promising approach for designing efficient blockchains, where block proposers are randomly chosen with probability proportional to their stake. A primary concern with PoS systems is the "rich getting richer" phenomenon, whereby wealthier nodes are more likely to get elected, and hence reap the block reward, making them even wealthier. In this paper, we introduce the notio… ▽ More

    Submitted 15 October, 2018; v1 submitted 20 September, 2018; originally announced September 2018.

    Comments: 26 pages

  36. arXiv:1809.05088  [pdf, other

    cs.NI

    High Throughput Cryptocurrency Routing in Payment Channel Networks

    Authors: Vibhaalakshmi Sivaraman, Shaileshh Bojja Venkatakrishnan, Kathy Ruan, Parimarjan Negi, Lei Yang, Radhika Mittal, Mohammad Alizadeh, Giulia Fanti

    Abstract: Despite growing adoption of cryptocurrencies, making fast payments at scale remains a challenge. Payment channel networks (PCNs) such as the Lightning Network have emerged as a viable scaling solution. However, completing payments on PCNs is challenging: payments must be routed on paths with sufficient funds. As payments flow over a single channel (link) in the same direction, the channel eventual… ▽ More

    Submitted 23 March, 2020; v1 submitted 13 September, 2018; originally announced September 2018.

  37. arXiv:1805.11060  [pdf, other

    cs.CR

    Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees

    Authors: Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, Pramod Viswanath

    Abstract: Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin's networking stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third-party observers to link transactions to the IP addresses that originated them. This lays the groundwork for low-cost, large-scale deanonymization attacks. In this work, we present Dandelion++, a first-principles de… ▽ More

    Submitted 28 May, 2018; originally announced May 2018.

  38. arXiv:1712.04086  [pdf, other

    cs.LG cs.IT stat.ML

    PacGAN: The power of two samples in generative adversarial networks

    Authors: Zinan Lin, Ashish Khetan, Giulia Fanti, Sewoong Oh

    Abstract: Generative adversarial networks (GANs) are innovative techniques for learning generative models of complex data distributions from samples. Despite remarkable recent improvements in generating realistic images, one of their major shortcomings is the fact that in practice, they tend to produce samples with little diversity, even when trained on diverse datasets. This phenomenon, known as mode colla… ▽ More

    Submitted 2 November, 2018; v1 submitted 11 December, 2017; originally announced December 2017.

    Comments: 49 pages, 24 figures

  39. arXiv:1703.08761  [pdf, other

    cs.CR

    Anonymity Properties of the Bitcoin P2P Network

    Authors: Giulia Fanti, Pramod Viswanath

    Abstract: Bitcoin is a popular alternative to fiat money, widely used for its perceived anonymity properties. However, recent attacks on Bitcoin's peer-to-peer (P2P) network demonstrated that its gossip-based flooding protocols, which are used to ensure global network consistency, may enable user deanonymization---the linkage of a user's IP address with her pseudonym in the Bitcoin network. In 2015, the Bit… ▽ More

    Submitted 25 March, 2017; originally announced March 2017.

  40. arXiv:1701.04439  [pdf, other

    cs.CR cs.IT

    Dandelion: Redesigning the Bitcoin Network for Anonymity

    Authors: Shaileshh Bojja Venkatakrishnan, Giulia Fanti, Pramod Viswanath

    Abstract: Bitcoin and other cryptocurrencies have surged in popularity over the last decade. Although Bitcoin does not claim to provide anonymity for its users, it enjoys a public perception of being a `privacy-preserving' financial system. In reality, cryptocurrencies publish users' entire transaction histories in plaintext, albeit under a pseudonym; this is required for transaction validation. Therefore,… ▽ More

    Submitted 16 January, 2017; originally announced January 2017.

  41. arXiv:1612.03371  [pdf, other

    cs.NI cs.CR

    Rangzen: Anonymously Getting the Word Out in a Blackout

    Authors: Adam Lerner, Giulia Fanti, Yahel Ben-David, Jesus Garcia, Paul Schmitt, Barath Raghavan

    Abstract: In recent years governments have shown themselves willing to impose blackouts to shut off key communication infrastructure during times of civil strife, and to surveil citizen communications whenever possible. However, it is exactly during such strife that citizens need reliable and anonymous communications the most. In this paper, we present Rangzen, a system for anonymous broadcast messaging dur… ▽ More

    Submitted 10 December, 2016; originally announced December 2016.

  42. arXiv:1509.02849  [pdf, other

    cs.CR cs.SI

    Hiding the Rumor Source

    Authors: Giulia Fanti, Peter Kairouz, Sewoong Oh, Kannan Ramchandran, Pramod Viswanath

    Abstract: Anonymous social media platforms like Secret, Yik Yak, and Whisper have emerged as important tools for sharing ideas without the fear of judgment. Such anonymous platforms are also important in nations under authoritarian rule, where freedom of expression and the personal safety of message authors may depend on anonymity. Whether for fear of judgment or retribution, it is sometimes crucial to hide… ▽ More

    Submitted 24 August, 2016; v1 submitted 9 September, 2015; originally announced September 2015.

  43. arXiv:1503.01214  [pdf, other

    cs.CR

    Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries

    Authors: Giulia Fanti, Vasyl Pihur, Úlfar Erlingsson

    Abstract: Techniques based on randomized response enable the collection of potentially sensitive data from clients in a privacy-preserving manner with strong local differential privacy guarantees. One of the latest such technologies, RAPPOR, allows the marginal frequencies of an arbitrary set of strings to be estimated via privacy-preserving crowdsourcing. However, this original estimation process requires… ▽ More

    Submitted 3 March, 2015; originally announced March 2015.

    Comments: 17 pages, 13 figures

  44. arXiv:1412.8439  [pdf, other

    cs.SI cs.LG

    Spy vs. Spy: Rumor Source Obfuscation

    Authors: Giulia Fanti, Peter Kairouz, Sewoong Oh, Pramod Viswanath

    Abstract: Anonymous messaging platforms, such as Secret and Whisper, have emerged as important social media for sharing one's thoughts without the fear of being judged by friends, family, or the public. Further, such anonymous platforms are crucial in nations with authoritarian governments; the right to free expression and sometimes the personal safety of the author of the message depend on anonymity. Wheth… ▽ More

    Submitted 25 April, 2015; v1 submitted 29 December, 2014; originally announced December 2014.

    Comments: 14 pages 10 figures

  45. arXiv:1210.5031  [pdf, other

    cs.IT cs.MA cs.NI

    Semi-Definite Programming Relaxation for Non-Line-of-Sight Localization

    Authors: Venkatesan Ekambaram, Giulia Fanti, Kannan Ramchandran

    Abstract: We consider the problem of estimating the locations of a set of points in a k-dimensional euclidean space given a subset of the pairwise distance measurements between the points. We focus on the case when some fraction of these measurements can be arbitrarily corrupted by large additive noise. Given that the problem is highly non-convex, we propose a simple semidefinite programming relaxation that… ▽ More

    Submitted 18 October, 2012; originally announced October 2012.